Institutions of higher learning find themselves engaged in an expensive defense race in buying current security tools and
changing their strategies in countering latest cyber security attacks. These strategies are meant to promote operational protection and
response to potential attacks on their cyberspace. In the meantime, the attackers are continuously finding ways around those set tools and
are able to switch their strategies to hit their different targets. This paper therefore looks at ways through which these organizations are
attacked, the extent of the attacks and how the institutions of higher learning can prepare and defend themselves against cyber-attacks.
Systematic Literature Review was used to dig deeper to the existing secondary data. It was indeed discovered that Institutions of higher
learning are frequently attacked and infiltrated for reasons such as modification of data such as school fees etc. by both internal agents
such as students and staff and external agents such as competitors and malicious attackers. We finally make recommendations on what
such institutions should do to defend themselves against such attacks.
Published In:IJCSN Journal Volume 8, Issue 4
Date of Publication : August 2019
Pages : 371-379
Figures :01
Tables : --
Mayieka Jared Maranga :
is a PhD student at Kabarak University-
Kenya. He holds a Master of Science in Information Technology
degree [2012] and Bachelor of Business Information Technology
[2009] from Strathmore University; He has worked as: a graduate
assistant at Strathmore University (2009 - 2012), an assistant
lecturer at Strathmore University's Faculty of Information
Technology (2012 - 2014), adjunct faculty as United States
International University's School of Science and Technology (2015
- 2016) and an assistant lecturer at Africa International University
(2016 to date). His current research interests are generally around
Computer Security and Audit and Databases.
Masese Bogomba Nelson :
holds PhD from Kibabii University
Kenya. He is currently a lecturer in Information Technology at
Kabarak University Kenya. His research interests include mobile
applications, security and IoT.
cyber security, cybercrime, cyber ethics, social media, & cloud computing
Institutions of higher learning in Kenya and indeed in
Africa and the globe in general are facing highly
increasing cyber-threats.
[1] Ashwin, P. (2016, August 10). Security is more than User
Education - it's About Cultural Change. Retrieved from
www.cso.com.au:
https://www.cso.com.au/article/604844/security-morethan-
user-education-it-about-cultural-change/
[2] Cheng, L. (2016). Chinese Politics in the Xi Jinping Era:
Reassessing Collective Leadership. Washington, D.C.:
Brookings Institution Press.
[3] Christopher, H., & Michele, F. (2015). Phishing Dark
Waters: The Offensive and Defensive Sides of Malicious
Emails. Hoboken, New Jersey: Wiley.
[4] Communications Authority of Kenya; Kenya National
Bureau of Statistics. (2017). The Public Sector ICT
survey 2016. Nairobi: Kenya National Bureau of
Statistics.
[5] David, B. (2016, June 5th). 6 Common Phishing Attacks
and How to Protect Against Them. Retrieved August 13,
2019, from The State of Security:
https://www.tripwire.com/state-of-security/securityawareness/
6-common-phishing-attacks-and-how-toprotect-
against-them/
[6] David, D. L., Robert, A. K., & Matthew, C. M. (2012).
mHealth Data Security: The Need for HIPAA-Compliant
Standardization. Telemedicine and e-Health, 18(4), 284 -
288.
[7] David, H. (2017, August 29). Security and Education.
Retrieved from welivesecurity.com:
https://www.welivesecurity.com/2017/08/29/securityand-
education/
[8] David, K., & Michael, G. S. (2013). Fundamentals of
Information Systems Security. Burlington,
Massachusetts: Jones & Bartlett Publishers.
[9] EDUCAUSE. (n.d.). Building Technology Strategy that
Enables Next Generation Enterprise IT. Retrieved July
12, 2019, from www.educause.edu:
https://www.educause.edu/focus-areas-andinitiatives/
enterprise-and-infrastructure/enterprise-itprogram/
building-technology-strategy-that-enables-nextgeneration-
enterprise-it
[10] Eric, B. (2018). Using Security Apps and Backup.
Berkeley, CA: Apress,.
[11] Folashade, B. O., & Adeta, A. K. (2013). The Nature,
Causes and Consequences of Cyber Crime in Tertiary
Institutions in Zaria-Kaduna State, Nigeria. American
International Journal of Contemporary Research, 3(9), 98
- 114.
[12] Harold, F. T., & Micki, K. (2003). Information Security
Management Handbook. Boca Raton, Florida: CRC
Press.
[13] Jakob, N. (2004, October 25). User Education Is Not the
Answer to Security Problems. Retrieved from Nielsen
Norman Group: World Leaders in Research-Based User
Experience: https://www.nngroup.com/articles/securityand-
user-education/
[14] Jan, C., Ronald, L., & Dieter, S. (2011). Digital Privacy:
PRIME - Privacy and Identity Management for Europe.
Heidelberg, Germany: Springer Science & Business
Media.
[15] Kai, G., Marcel, T., Bastian, W., & Markus, R. (2018).
Comparison of approaches to encrypt data for supply
chain simulation applications in cloud environments.
WSC '18 Proceedings of the 2018 Winter Simulation
Conference. Gothenburg, Sweden: IEEE Press
Piscataway, NJ, USA.
[16] Lee, Y.-J. (2019). Masese Bogomba Nelson holds PhD
from Kibabii University Kenya, He is currently.
IndianJournals.com, 19(2).
[17] Ministry of Information, Communications and
Technology. (2014, April 20). National Security Strategy
2014. Nairobi. Retrieved August 2019, 13th, from http://icta.go.ke/pdf/NATIONAL%20CYBERSECURIT
Y%20STRATEGY.pdf
[18] Mostafa, E., Mohamed, B., & Faddoul, K. (2017).
Advanced Information Technology, Services and
Systems: Proceedings of the International Conference on
Advanced Information Technology, Services and Systems
(AIT2S-17) Held on April 14/15, 2017 in Tangier. York
City: Springer.
[19] Nikhita, R. G., & Ugander, R. G. (2014, January). A
Study of Cyber Security Challenges and Its Emerging
Trends on Latest Technologies. International Journal of
Engineering and Technology, Volume 4 (1).
[20] Peter, M., & Kenneth, E. (2018). Design and Analysis for
Quantitative Research in Music Education. Oxford, U.K:
Oxford University Press.
[21] Resources Management, A. I. (Ed.). (2018). Cyber
Security and Threats: Concepts, Methodologies, Tools,
and Applications: Concepts, Methodologies, Tools, and
Applications. Hershey, Pennsylvania: IGI Global.
[22] Tanya, R. (2015, November 2). The Top 10 Higher Ed IT
Issues of 2016. Retrieved August 13, 2019, from Center
for Digital Education (EDUCAUSE):
https://www.govtech.com/education/higher-ed/The-Top-
10-Higher-Ed-IT-Issues-of-2016.html
[23] Tanya, R. (2016, May 18). 8 Cybersecurity Challenges
Facing Higher Education. Retrieved August 13, 2019,
from Centre for Digital Education:
https://www.govtech.com/education/higher-ed/8-
Cybersecurity-Challenges-Facing-Higher-Education.html
[24] Trend, M. (2015, March 9). The challenges of cyber
security education and training in 2015. Retrieved from
https://blog.trendmicro.com:
https://blog.trendmicro.com/the-challenges-of-cybersecurity-
education-and-training-in-2015/.